Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 11:16
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2de7b89a4224c7039771f8b5f37401599da7512c4e50a83440aec407e7f498b1.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_2de7b89a4224c7039771f8b5f37401599da7512c4e50a83440aec407e7f498b1.dll
-
Size
184KB
-
MD5
9ff430322335bd3d1b0b4299b0b7e2c5
-
SHA1
89dad42c05a79ddbf26c63723f5363f1e387285a
-
SHA256
2de7b89a4224c7039771f8b5f37401599da7512c4e50a83440aec407e7f498b1
-
SHA512
3e6f3e9881509547e69486994e110d241acba076b42b2e9063730269a0b3b5127fb2970377837a67926406fdcbadac1493e327952c0d7800d872f84b033fd2ba
-
SSDEEP
3072:suwfhNXphcqs2tJYsoa9Xibolk0CtPBU1jhhF8ZJ8fDo4K4lmsb:y7TXYsd9SkONU1jKGlflm
Malware Config
Extracted
dridex
22202
103.75.201.2:443
158.223.1.108:6225
165.22.28.242:4664
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2692-1-0x0000000074C90000-0x0000000074CC0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2888 2692 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2692 3052 rundll32.exe 31 PID 3052 wrote to memory of 2692 3052 rundll32.exe 31 PID 3052 wrote to memory of 2692 3052 rundll32.exe 31 PID 3052 wrote to memory of 2692 3052 rundll32.exe 31 PID 3052 wrote to memory of 2692 3052 rundll32.exe 31 PID 3052 wrote to memory of 2692 3052 rundll32.exe 31 PID 3052 wrote to memory of 2692 3052 rundll32.exe 31 PID 2692 wrote to memory of 2888 2692 rundll32.exe 32 PID 2692 wrote to memory of 2888 2692 rundll32.exe 32 PID 2692 wrote to memory of 2888 2692 rundll32.exe 32 PID 2692 wrote to memory of 2888 2692 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2de7b89a4224c7039771f8b5f37401599da7512c4e50a83440aec407e7f498b1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2de7b89a4224c7039771f8b5f37401599da7512c4e50a83440aec407e7f498b1.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 2203⤵
- Program crash
PID:2888
-
-